Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
4921
Damping Based Traffic Allocation in Wireless Machine-to-Machine Communications Networks
Published 2013-11-01Get full text
Article -
4922
-
4923
GTAT: empowering graph neural networks with cross attention
Published 2025-02-01Get full text
Article -
4924
-
4925
-
4926
High Conductivity of Mg-Doped Al0.3Ga0.7N with Al0.4Ga0.6N/AlN Superlattice Structure
Published 2014-01-01Get full text
Article -
4927
A Framework for Cloud-Based Healthcare Services to Monitor Noncommunicable Diseases Patient
Published 2015-03-01Get full text
Article -
4928
DMSS: An Attention-Based Deep Learning Model for High-Quality Mass Spectrometry Prediction
Published 2024-09-01Get full text
Article -
4929
Smart manufacturing paradigms in the context of industry 4.0: Bibliometric analysis
Published 2025-01-01Get full text
Article -
4930
-
4931
Stochastic logic in biased coupled photonic probabilistic bits
Published 2025-01-01“…An important computing approach that is still missing its corresponding optical hardware is probabilistic computing, used e.g. for solving difficult combinatorial optimization problems. …”
Get full text
Article -
4932
Existence Results for an Implicit Coupled System Involving $\xi$-Caputo and $p$-Laplacian Operators
Published 2024-10-01Get full text
Article -
4933
A Novel Evaluation Method for Building Construction Project Based on Integrated Information Entropy with Reliability Theory
Published 2013-01-01“…Combined with a practical case, this paper also presents detailed computing processes and steps, including selecting all order indexes, establishing the index matrix, computing score values of all order indexes, computing the synthesis score, sorting all selected schemes, and making analysis and decision. …”
Get full text
Article -
4934
Hölder’s inequality for shifted quantum integral operator
Published 2025-06-01Get full text
Article -
4935
A New Result for ψ-Hilfer Fractional Pantograph-Type Langevin Equation and Inclusions
Published 2022-01-01Get full text
Article -
4936
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
Published 2019-04-01“…With the wide deployment of new computing paradigms, such as cloud computing and edge computing, the people can access services provided by remote servers more conveniently via the Internet. …”
Get full text
Article -
4937
-
4938
A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment
Published 2013-03-01“…Cloud computing provides network based access to computing and data storage services on a pay per usage model. …”
Get full text
Article -
4939
Optimization strategies for multi‐block structured CFD simulation based on Sunway TaihuLight
Published 2025-01-01“…In this article, we proposed several optimization strategies to improve the computing efficiency of multi‐block structured CFD simulation based on Sunway TaihuLight super computing system, including: (1) a load balancing decomposition approach combined with recursive segmentation of undirected graphs and block mapping for multi‐structured blocks, (2) two‐level parallelism that utilizes MPI + OpenACC2.0* hybrid parallel paradigms with various performance optimizations such as data preprocessing, reducing unnecessary loops of subroutine calls, collapse, and tile syntax, memory access optimization between the main memory and local data memory (LDM), and (3) a carefully orchestrated pipeline and register communication strategy between computing processor elements (CPEs) to tackle the dependence of LU‐SGS (Lower‐Upper Symmetric Gauss–Seidel). …”
Get full text
Article -
4940
Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy
Published 2012-01-01“…In general, users may immunize their computers with countermeasures in exposed and infectious state, which may take a period of time. …”
Get full text
Article